摘要:
Systems, methods and computer products for profile-based identity verification over the Internet. Exemplary embodiments include a system including an activity classifier configured to receive Internet activity input including email, chat, browser and voice over Internet Protocol (VoIP) logs/streams, an email profiler, a chat, a browser profiler, a voice over Internet Protocol (VoIP) logs/streams profiler, wherein the profilers are configured to extract values from the Internet Activity input attributes from the data set, a score calculator configured to receive the attributes and calculate the score of the data set, a categorization engine configured to receive the score from the score calculator and map the data set to an individual or class of individuals based on the value of the score and on a database of activity-specific attributes and an application configured to place weights on the activity specific and generic attributes to define a score function from the score.
摘要:
A method, system and program storage device for browsing hyperlinked documents are provided. A method in one aspect may include enabling navigating from a document having a plurality of hyperlinks to a document associated with one of said plurality of hyperlinks; and enabling navigating directly from said document associated with one of said plurality of hyperlinks to another document associated with another one of said plurality of hyperlinks using one or more of a plurality of defined elements. System and program storage device for performing the above methods are also provided.
摘要:
Systems, methods and computer products for profile-based identity verification over the Internet. Exemplary embodiments include a method for profiling a user on a network, the method including receiving an input of streams corresponding to network activities associated with the user, wherein the input of streams are received from one or more layers of the network, in response to receiving a request to supply specified-input, receiving a score function and a list of attributes to be monitored, classifying the input of streams into network-activity classifications, extracting values and attributes for the network-activity classifications, and placing the extracted values and attributes into data sets, calculating a score of the data sets, comparing the data sets to a database of activity-specific attributes and mapping the data sets to a class of individuals based on a value of the score and the comparison of the database of activity-specific attributes.
摘要:
A web page is adaptively transcribed and rendered at a client endpoint. A request for a web page is received, and full page content of the web page is obtained from a remote web server, including assembly of previously cached parts of the web page. The web page is transcribed according to prescribed rules. The prescribed rules are selected according to user preferences, the environmental factors and information learned from prior handling of the web page. The transcribed web page is rendered.
摘要:
One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).
摘要:
A method for dynamically re-calculating and presenting a graphical user interface (GUI) that includes interface icons based on user context, includes, for a current user, determining a change in user context associated with the GUI. The method then modifies one of a state, appearance and spatial placement of the user interface icons within the GUI automatically, in accordance with a determined change in user context. The step of determining a change in user context may further include analyzing a set of contextual attributes associated with the user. For that matter, the step of determining is preferably automatically triggered by at least one factor from a group of factors, the group of factors including a) a creation date of a data item associated with the current user, b) a modification date of a data item associated with the current user, c) a last-accessed date of a data item associated with the current user, d) a type of a data item associated with the current user, e) a location of a data item associated with the current user, f) a category of a data item's content, the data item associated with the current user, g) a size of a data item, the data item associated with the current user, h) a source of a data item associated with the current user and i) a completeness of a data item associated with the current user.
摘要:
One embodiment of the present method and apparatus for processing a search request message received over a network includes computing a threshold value in accordance with the search request message and returning at least one search result to a user in response to the search request message, if a rank of the at least one search result at least meets the threshold value.
摘要:
One embodiment of the present method and apparatus for assisting a peer-to-peer connection between a first node and a second node includes receiving, at a third node, a request for connection assistance from one of the first and second nodes. The third node then connects to both the first node and the second node, receives the data from the first node and delivers the data to the second node. In this manner, data may be transferred between the first and second nodes even if the first and second nodes are unable to directly connect to each other (e.g., due to permanent or temporary limitations).
摘要:
One embodiment of the present method and apparatus for reducing spam in peer-to-peer networks includes forming a search message including at least one decoy word and sending the search request message, including the decoy word(s), to one or more nodes in the network. Embodiments of the present invention make it possible to weed out nodes in the network that send spam in response to every search message (e.g., regardless of the search message's content).
摘要:
Methods, systems and program storage devices receive actions taken by a user during an interaction with a web resource, wherein the actions cause the web resource to assume a particular state; and save information describing the actions. Other methods, systems and program storage devices retrieve the information; and perform at least one action using the information, causing a graphical user interface to display the web resource in a state in accordance with the action. The particular state can include without limitation a plurality of states assumed sequentially when the web resource is displayed, and the information can describe a sequential series of actions that cause the web resource to assume the sequential series of states. In such variants further operations include receiving a series of commands to step through the sequential states of the web resource; and using the information to display the sequential states. The series of commands can be issued automatically or under user control.